CVE-2013-10070
CRITICALPHP-Charts v1.0 - RCE
Title source: llmDescription
PHP-Charts v1.0 contains a PHP code execution vulnerability in wizard/url.php, where user-supplied GET parameter names are passed directly to eval() without sanitization. A remote attacker can exploit this flaw by crafting a request that injects arbitrary PHP code, resulting in command execution under the web server's context. The vulnerability allows unauthenticated attackers to execute system-level commands via base64-encoded payloads embedded in parameter names, leading to full compromise of the host system.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/24273
exploitdb
WORKING POC
VERIFIED
by AkaStep · textwebappsphp
https://www.exploit-db.com/exploits/24201
metasploit
WORKING POC
EXCELLENT
by AkaStep, bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/php_charts_exec.rb
References (5)
Scores
CVSS v4
10.0
EPSS
0.6252
EPSS Percentile
98.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Details
CWE
CWE-95
Status
published
Products (1)
PHP-Charts/PHP-Charts
1.0
Published
Aug 05, 2025
Tracked Since
Feb 18, 2026